Search results
1 – 10 of 757Nehemia Sugianto, Dian Tjondronegoro, Rosemary Stockdale and Elizabeth Irenne Yuwono
The paper proposes a privacy-preserving artificial intelligence-enabled video surveillance technology to monitor social distancing in public spaces.
Abstract
Purpose
The paper proposes a privacy-preserving artificial intelligence-enabled video surveillance technology to monitor social distancing in public spaces.
Design/methodology/approach
The paper proposes a new Responsible Artificial Intelligence Implementation Framework to guide the proposed solution's design and development. It defines responsible artificial intelligence criteria that the solution needs to meet and provides checklists to enforce the criteria throughout the process. To preserve data privacy, the proposed system incorporates a federated learning approach to allow computation performed on edge devices to limit sensitive and identifiable data movement and eliminate the dependency of cloud computing at a central server.
Findings
The proposed system is evaluated through a case study of monitoring social distancing at an airport. The results discuss how the system can fully address the case study's requirements in terms of its reliability, its usefulness when deployed to the airport's cameras, and its compliance with responsible artificial intelligence.
Originality/value
The paper makes three contributions. First, it proposes a real-time social distancing breach detection system on edge that extends from a combination of cutting-edge people detection and tracking algorithms to achieve robust performance. Second, it proposes a design approach to develop responsible artificial intelligence in video surveillance contexts. Third, it presents results and discussion from a comprehensive evaluation in the context of a case study at an airport to demonstrate the proposed system's robust performance and practical usefulness.
Details
Keywords
Janina Seutter, Michelle Müller, Stefanie Müller and Dennis Kundisch
Whenever social injustice tackled by social movements receives heightened media attention, charitable crowdfunding platforms offer an opportunity to proactively advocate for…
Abstract
Purpose
Whenever social injustice tackled by social movements receives heightened media attention, charitable crowdfunding platforms offer an opportunity to proactively advocate for equality by donating money to affected people. This research examines how the Black Lives Matter movement and the associated social protest cycle after the death of George Floyd have influenced donation behavior for campaigns with a personal goal and those with a societal goal supporting the black community.
Design/methodology/approach
This paper follows a quantitative research approach by applying a quasi-experimental research design on a GoFundMe dataset. In total, 67,905 campaigns and 1,362,499 individual donations were analyzed.
Findings
We uncover a rise in donations for campaigns supporting the black community, which lasts substantially longer for campaigns with a societal than with a personal funding goal. Informed by construal level theory, we attribute this heterogeneity to changes in the level of abstractness of the problems that social movements aim to tackle.
Originality/value
This research advances the knowledge of individual donation behavior in charitable crowdfunding. Our results highlight the important role that charitable crowdfunding campaigns play in promoting social justice and anti-discrimination as part of social protest cycles.
Details
Keywords
WenFeng Qin, Yunsheng Xue, Hao Peng, Gang Li, Wang Chen, Xin Zhao, Jie Pang and Bin Zhou
The purpose of this study is to design a wearable medical device as a human care platform and to introduce the design details, key technologies and practical implementation…
Abstract
Purpose
The purpose of this study is to design a wearable medical device as a human care platform and to introduce the design details, key technologies and practical implementation methods of the system.
Design/methodology/approach
A multi-channel data acquisition scheme based on PCI-E (rapid interconnection of peripheral components) was proposed. The flexible biosensor is integrated with the flexible data acquisition card with monitoring capability, and the embedded (device that can operate independently) chip STM32F103VET6 is used to realize the simultaneous processing of multi-channel human health parameters. The human health parameters were transferred to the upper computer LabVIEW by intelligent clothing through USB or wireless Bluetooth to complete the transmission and processing of clinical data, which facilitates the analysis of medical data.
Findings
The smart clothing provides a mobile medical cloud platform for wearable medical through cloud computing, which can continuously monitor the body's wrist movement, body temperature and perspiration for 24 h. The result shows that each channel is completely accurate to the top computer display, which can meet the expected requirements, and the wearable instant care system can be applied to healthcare.
Originality/value
The smart clothing in this study is based on the monitoring and diagnosis of textiles, and the electronic communication devices can cooperate and interact to form a wearable textile system that provides medical monitoring and prevention services to individuals in the fastest and most accurate way. Each channel of the system is precisely matched to the display screen of the host computer and meets the expected requirements. As a real-time human health protection platform technology, continuous monitoring of human vital signs can complete the application of human motion detection, medical health monitoring and human–computer interaction. Ultimately, such an intelligent garment will become an integral part of our everyday clothing.
Details
Keywords
Vaclav Snasel, Tran Khanh Dang, Josef Kueng and Lingping Kong
This paper aims to review in-memory computing (IMC) for machine learning (ML) applications from history, architectures and options aspects. In this review, the authors investigate…
Abstract
Purpose
This paper aims to review in-memory computing (IMC) for machine learning (ML) applications from history, architectures and options aspects. In this review, the authors investigate different architectural aspects and collect and provide our comparative evaluations.
Design/methodology/approach
Collecting over 40 IMC papers related to hardware design and optimization techniques of recent years, then classify them into three optimization option categories: optimization through graphic processing unit (GPU), optimization through reduced precision and optimization through hardware accelerator. Then, the authors brief those techniques in aspects such as what kind of data set it applied, how it is designed and what is the contribution of this design.
Findings
ML algorithms are potent tools accommodated on IMC architecture. Although general-purpose hardware (central processing units and GPUs) can supply explicit solutions, their energy efficiencies have limitations because of their excessive flexibility support. On the other hand, hardware accelerators (field programmable gate arrays and application-specific integrated circuits) win on the energy efficiency aspect, but individual accelerator often adapts exclusively to ax single ML approach (family). From a long hardware evolution perspective, hardware/software collaboration heterogeneity design from hybrid platforms is an option for the researcher.
Originality/value
IMC’s optimization enables high-speed processing, increases performance and analyzes massive volumes of data in real-time. This work reviews IMC and its evolution. Then, the authors categorize three optimization paths for the IMC architecture to improve performance metrics.
Details
Keywords
Hedaia-t-Allah Nabil Abd Al Ghaffar
The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.
Abstract
Purpose
The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs.
Design/methodology/approach
The paper adopts the analytical approach to first lay foundations of the relation between national security, cybersecurity and cloud computing, then it moves to analyze the main vulnerabilities that could affect national security in cases of government cloud computing usage.
Findings
The paper reached several findings such as the relation between cybersecurity and national security as well as a group of factors that may affect national security when governments shift to cloud computing mainly pertaining to storing data over the internet, the involvement of a third party, the lack of clear regulatory frameworks inside and between countries.
Practical implications
Governments are continuously working on developing their digital capacities to meet citizens’ demands. One of the most trending technologies adopted by governments is “cloud computing”, because of the tremendous advantages that the technology provides; such as huge cost-cutting, huge storage and computing capabilities. However, shifting to cloud computing raises a lot of security concerns.
Originality/value
The value of the paper resides in the novelty of the topic, which is a new contribution to the theoretical literature on relations between new technologies and national security. It is empirically important as well to help governments stay safe while enjoying the advantages of cloud computing.
Details
Keywords
Dong Huan Shen, Shuai Guo, Hao Duan, Kehao Ji and Haili Jiang
The paper focuses on the issue of manual rebar-binding tasks in the construction industry, which are marked by high labor intensity, high costs and inefficient operations. The…
Abstract
Purpose
The paper focuses on the issue of manual rebar-binding tasks in the construction industry, which are marked by high labor intensity, high costs and inefficient operations. The rebar-binding robots that are currently available are not fully mature. Most of them can only bind one or two nodes in one position, which leads to significant time wastage in movement. Based on a new type of rebar-binding robot, this paper aims to propose a new movement and binding control that reduces manpower and enhances efficiency.
Design/methodology/approach
The robot is combined with photoelectric sensors, travel switches and other sensors. It is supposed to move accurately and run in a limited area on the rebar mesh through logical judgment, speed control and position control. Machine vision is used by the robot to locate the rebar nodes and then adjusts the binding-gun position to ensure that multiple rebar nodes are bound sequentially.
Findings
By moving on the rebar mesh with accuracy, the robot meets the positioning accuracy requirements of the binding module, with experimental testing accuracy within 5 mm. Furthermore, its ability to bind four rebar nodes in one place results in a high efficiency and a binding effect that meets building standards.
Originality/value
The innovative design of the robot can adapt itself to the rebar mesh, move accurately to the target position and bind four nodes at that position, which reduces the number of movements on the mesh. Repetitive and heavy rebar-binding tasks can be efficiently completed by the robot, which saves human resources, reduces worker labor intensity and reduces construction overhead. It provides a more feasible and practical solution for using robots to bind rebar nodes.
Details
Keywords
Georgios Pallaris, Panayiotis Zaphiris and Antigoni Parmaxi
The purpose of this study is to chart the development of Makerspaces in higher education (MIHE), by building a map of existing research work in the field. Based on a corpus of 183…
Abstract
Purpose
The purpose of this study is to chart the development of Makerspaces in higher education (MIHE), by building a map of existing research work in the field. Based on a corpus of 183 manuscripts, published between January 2014 and April 2021, it sets out to describe the range of topics covered under the umbrella of MIHE and provide a holistic view of the field.
Design/methodology/approach
The approach adopted in this research includes development of the 2014–2021 MIHE corpus; literature overview and initial coding scheme development; refinement of the initial coding scheme with the help of a focus group and construction of the MIHE map version 1.0; refinement of the MIHE map version 1.0 following a systematic approach of content analysis and development of the MIHE map version 2.0; evaluation of the proposed structure and inclusiveness of all categories in the MIHE map version 2.0 using card-sorting technique; and, finally, development of the MIHE map version 3.0.
Findings
The research trends in the categories of the MIHE map are discussed, as well as possible future directions in the field.
Originality/value
This paper provides a holistic view of the field of MIHE guiding both junior MIHE researchers to place themselves in the field, and policymakers and decision-makers who attempt to evaluate the current and future scholar activity in the field. Finally, it caters for more experienced researchers to focus on certain underinvestigated domains.
Details
Keywords
The purpose of this paper is to consider the ethical and environmental implications of allowing space resource extraction to disrupt existing fuel economies, including how…
Abstract
Purpose
The purpose of this paper is to consider the ethical and environmental implications of allowing space resource extraction to disrupt existing fuel economies, including how companies can be held accountable for ensuring the responsible use of their space assets. It will also briefly consider how such assets should be taxed, and the cost/benefit analyses required to justify the considerable expense of supporting this emerging space industry.
Design/methodology/approach
This paper adopts theoretical bioethics methodologies to explore issues of normative ethics and the formulation of moral rules to govern individual, collective and institutional behaviour. Specifically, it considers social justice and social contract theory, consequentialist and deontological accounts of ethical evaluation. It also draws on sociological and organisational literature to discuss Dowling and Pfeffer’s (1975) and Suchman’s (1995) theories of pragmatic, cognitive and moral legitimacy as they may be applied to off-world mining regulations and the handling of space assets.
Findings
The findings of this conceptual paper indicate there is both a growing appetite for tighter resource extraction regulations to address climate change and wealth concentration globally, and an opportunity to establish and legitimise new ethical norms for commercial activity in space that can avoid some of the challenges currently facing fossil fuel divestment movements on Earth.
Originality/value
By adopting methodologies from theoretical bioethics, sociology and business studies, including applying a legitimacy lens to the issue of off-world mining, this paper synthesises existing knowledges from these fields and brings them to the new context of the future space resource economy.
Details
Keywords
Bikesh Manandhar, Thanh-Canh Huynh, Pawan Kumar Bhattarai, Suchita Shrestha and Ananta Man Singh Pradhan
This research is aimed at preparing landslide susceptibility using spatial analysis and soft computing machine learning techniques based on convolutional neural networks (CNNs)…
Abstract
Purpose
This research is aimed at preparing landslide susceptibility using spatial analysis and soft computing machine learning techniques based on convolutional neural networks (CNNs), artificial neural networks (ANNs) and logistic regression (LR) models.
Design/methodology/approach
Using the Geographical Information System (GIS), a spatial database including topographic, hydrologic, geological and landuse data is created for the study area. The data are randomly divided between a training set (70%), a validation (10%) and a test set (20%).
Findings
The validation findings demonstrate that the CNN model (has an 89% success rate and an 84% prediction rate). The ANN model (with an 84% success rate and an 81% prediction rate) predicts landslides better than the LR model (with a success rate of 82% and a prediction rate of 79%). In comparison, the CNN proves to be more accurate than the logistic regression and is utilized for final susceptibility.
Research limitations/implications
Land cover data and geological data are limited in largescale, making it challenging to develop accurate and comprehensive susceptibility maps.
Practical implications
It helps to identify areas with a higher likelihood of experiencing landslides. This information is crucial for assessing the risk posed to human lives, infrastructure and properties in these areas. It allows authorities and stakeholders to prioritize risk management efforts and allocate resources more effectively.
Social implications
The social implications of a landslide susceptibility map are profound, as it provides vital information for disaster preparedness, risk mitigation and landuse planning. Communities can utilize these maps to identify vulnerable areas, implement zoning regulations and develop evacuation plans, ultimately safeguarding lives and property. Additionally, access to such information promotes public awareness and education about landslide risks, fostering a proactive approach to disaster management. However, reliance solely on these maps may also create a false sense of security, necessitating continuous updates and integration with other risk assessment measures to ensure effective disaster resilience strategies are in place.
Originality/value
Landslide susceptibility mapping provides a proactive approach to identifying areas at higher risk of landslides before any significant events occur. Researchers continually explore new data sources, modeling techniques and validation approaches, leading to a better understanding of landslide dynamics and susceptibility factors.
Details
Keywords
This study aims to examine the illicit capital movement through trade misinvoicing in Burundi, at disaggregated levels by major trading partners and by major export and import…
Abstract
Purpose
This study aims to examine the illicit capital movement through trade misinvoicing in Burundi, at disaggregated levels by major trading partners and by major export and import commodities.
Design/methodology/approach
Trade misinvoicing is estimated by comparing the trade values declared by Burundi with those declared by trading partners in a bilateral international transaction, after adjusting for the cost of freight and insurance. Disaggregated trade misinvoicing by major trading partners is computed using the Direction of Trade Statistics database of the International Monetary Fund over the period 1970–2019. Disaggregated trade misinvoicing by major trading commodities is computed using the UN-COMTRADE database over the period 1993–2019.
Findings
Exports of Burundi to most of its major trading partners are found to be underinvoiced. The top destinations for export underinvoicing are United Arab Emirates, Belgium and Germany. However, exports to UK and Switzerland are found to be overinvoiced. The major export commodities considered, coffee and gold, are found to be affected by trade misinvoicing to a great extent. On the import side, the estimation results indicate that imports of Burundi from its major trading partners are in general overinvoiced. High import overinvoicing is observed in the trade with Saudi Arabia, China and Japan. At commodity level, for the top 6 commodities considered, imports were to a great extent found to be overinvoiced. Cases of illicit capital outflows and inflows through trade misinvoicing are highlighted.
Practical implications
Some policy implications are drawn from this study. First, in collaboration with its development partners, the Government of Burundi should put in place measures to reduce the trade misinvoicing phenomenon, which undermines poverty reduction efforts. The study has shown which trade partners are involved and which commodities are mostly affected. Policy efforts could then be focused in that regard. Investigations at the company and transaction levels can be made to identify the mechanisms of trade misinvoicing. Second, more effort is needed in ensuring systematic and transparent reporting of international trade transactions. To fight trade misinvoicing, transparency in international trade is key, through coordinated enforcement of reporting rules.
Originality/value
Previous studies analyzed the problem of trade misinvoicing at an aggregated level. However, this leaves out essential information on trading partners involved in the phenomenon as well as trading commodities affected. This study investigates trade misinvoicing at disaggregated levels, at product level and by trading partner.
Details